19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

154<br />

Part III: Hacking Network Hosts<br />

Detecting Common Router, Switch,<br />

and Firewall Weaknesses<br />

In addition to the more technical exploits that I cover in this chapter, some<br />

high-level security vulnerabilities commonly found on network devices can<br />

create many problems.<br />

Finding unsecured interfaces<br />

You want to ensure that HTTP and telnet interfaces to your routers, switches,<br />

and firewall aren’t configured with a blank, default, or otherwise easy-toguess<br />

password. This advice sounds like a no-brainer, but it’s for one of the<br />

most common weaknesses. When a malicious insider or other attacker gains<br />

access to your network devices, he owns the network. He can then lock out<br />

administrative access, set up back-door user accounts, reconfigure ports,<br />

and even bring down the entire network without you ever knowing.<br />

I once found a simple password that a systems integrator had configured on a<br />

Cisco ASA firewall and was able to log in to the firewall with full administrative<br />

rights. Just imagine what could happen in this situation if someone with malicious<br />

intent came across this password. Lesson learned: It’s the little things<br />

that can get you. Know what your vendors are doing and keep an eye on them!<br />

Another weakness is related to HTTP and telnet being enabled and used on<br />

many network devices. Care to guess why this is a problem? Well, anyone<br />

with some free tools and a few minutes of time can sniff the network and capture<br />

login credentials for these systems when they’re being sent in cleartext.<br />

When that happens, anything goes.<br />

Exploiting IKE weaknesses<br />

Businesses running a VPN on a router or firewall are common. If you fall into<br />

this category, chances are good that your VPN is running the Internet Key<br />

Exchange (IKE) protocol, which has a couple of well-known exploitable<br />

weaknesses:<br />

✓ It’s possible to crack IKE “aggressive mode” pre-shared keys using Cain<br />

& Abel and the IKECrack tool (http://ikecrack.sourceforge.net).<br />

✓ Some IKE configurations, such as those in certain Cisco PIX firewalls,<br />

can be taken offline. All the attacker has to do is send 10 packets per<br />

second at 122 bytes each and you have a DoS attack on your hands.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!